
Cornell Researchers Develop Invisible Light-Based Watermark To Detect Deepfakes 56
Cornell University researchers have developed an "invisible" light-based watermarking system that embeds unique codes into the physical light that illuminates the subject during recording, allowing any camera to capture authentication data without special hardware. By comparing these coded light patterns against recorded footage, analysts can spot deepfake manipulations, offering a more resilient verification method than traditional file-based watermarks. TechSpot reports: Programmable light sources such as computer monitors, studio lighting, or certain LED fixtures can be embedded with coded brightness patterns using software alone. Standard non-programmable lamps can be adapted by fitting them with a compact chip -- roughly the size of a postage stamp -- that subtly fluctuates light intensity according to a secret code. The embedded code consists of tiny variations in lighting frequency and brightness that are imperceptible to the naked eye. Michael explained that these fluctuations are designed based on human visual perception research. Each light's unique code effectively produces a low-resolution, time-stamped record of the scene under slightly different lighting conditions. [Abe Davis, an assistant professor] refers to these as code videos.
"When someone manipulates a video, the manipulated parts start to contradict what we see in these code videos," Davis said. "And if someone tries to generate fake video with AI, the resulting code videos just look like random variations." By comparing the coded patterns against the suspect footage, analysts can detect missing sequences, inserted objects, or altered scenes. For example, content removed from an interview would appear as visual gaps in the recovered code video, while fabricated elements would often show up as solid black areas. The researchers have demonstrated the use of up to three independent lighting codes within the same scene. This layering increases the complexity of the watermark and raises the difficulty for potential forgers, who would have to replicate multiple synchronized code videos that all match the visible footage. The concept is called noise-coded illumination and was presented on August 10 at SIGGRAPH 2025 in Vancouver, British Columbia.
"When someone manipulates a video, the manipulated parts start to contradict what we see in these code videos," Davis said. "And if someone tries to generate fake video with AI, the resulting code videos just look like random variations." By comparing the coded patterns against the suspect footage, analysts can detect missing sequences, inserted objects, or altered scenes. For example, content removed from an interview would appear as visual gaps in the recovered code video, while fabricated elements would often show up as solid black areas. The researchers have demonstrated the use of up to three independent lighting codes within the same scene. This layering increases the complexity of the watermark and raises the difficulty for potential forgers, who would have to replicate multiple synchronized code videos that all match the visible footage. The concept is called noise-coded illumination and was presented on August 10 at SIGGRAPH 2025 in Vancouver, British Columbia.
This is great and all.. (Score:4, Informative)
This is not great at all.. (Score:3)
Delusional thinking is a serious problem in our society and shouldn't be dismissed as simply being some minority fringe opinion.
These people can be mobilized to assault and tear down a liberal democracy. Misinformation campaigns have made them into the unwitting foot soldiers of a new culture war.
Re: (Score:2)
What a flimsy excuse for fascism.
We can certainly discuss the issue of gender, identity, and individual liberty without tearing down our whole society.
Re: This is not great at all.. (Score:1)
Re:This is great and all.. (Score:4, Interesting)
Will it even work? Things like this tend to be vulnerable to AI being trained to reproduce it.
Re: (Score:2)
If the light is encoded properly, you could embed SHA-256 hashes, which, while mimicable they would not be able to produce the hash if the video were altered.
Is it Great? (Score:2)
This method lets the creator of the video know whether or not it has been manipulated but since they were there they should know tha
Re: (Score:2)
acritical thinking is way more widespread than you think ...
What Orwell got wrong (Score:5, Insightful)
I reread 1984 a few years ago and the thing that really struck me is what Orwell got wrong: the notion that you need to erase evidence of factual data (at great effort/expense) in order to propagate lies. It turns out that you just need to shout a little louder and a lot of folks will eat it up.
Which should have been obvious by then, but which was not even obvious to me when I read it the first time (in HS - around '84). But at this point we've all very much lived through it (and continue to).
The number of people who care about what's factual or actual isn't enough.
Re: (Score:3, Informative)
Re:What Orwell got wrong (Score:5, Interesting)
what Orwell got wrong: the notion that you need to erase evidence of factual data (at great effort/expense) in order to propagate lies
No, he didn't. That, as was made patently clear by the long and tedious dialogs between O'Brien and Smith in the torture room, was a temporary measure while people were trained to deny reality. There was even the break-through scene, really visual:
"'How many fingers do you see, kwerle?' asked the ICE agent gently. And this time, for the first time kwerle saw with clarity two fingers raised" or somesuch.
He even got right the bit that even if social pressure and fake news will do it without the need of physical torture, the torture is still necessary because cruelty is the point. It ain't a surprise, Orwell experienced it first-hand in Spain, so he knew how it works. Fakery and pretense was everyday life behind the Iron Curtain not 40 years ago, the deep fa... I mean the "AI revolution" has only made it just a tad smoother and that's all.
Re: (Score:2)
Re: (Score:2)
Yea, it's the "2 + Torture = 5" trope [tvtropes.org]. That Chain of Command Part II episode is one of the best of the season, possibly of the series. And a hell of a lead into the start of a new spin off, Deep Space 9.
Re: (Score:2)
that reminds me of when Picard was captured by the Cardassians and was tortured in Star Trek TNG.
They made him listen to Kanye?. That would be pretty awful.
Re: (Score:2)
spot on comment, but one small precision: orwell didn't experience torture "first hand" in spain, at least there is no account from him that i know of. he did have knowledge about some of his comrades being subjected to torture and dying in suspicious circumstances.
it's very likely though that he heard many testimonies that he didn't record. torture was ofc pretty common, specially and more systematically on the fascist side, and is well documented but still keeps getting denied today by believers despite
Re: (Score:2)
orwell didn't experience torture "first hand" in spain, at least there is no account from him that i know of
It's been a long while since I've read anything about or from Mr. Blair, but I'm imagining that I remember reading bits from his biography about his time as a journalist in Spain, his contact with the Stalinist faction there, which was trying to take the lead of the anti-fascist movement there, playing as dirty against the competition as you can imagine, and how the whole Stalinist campaign disgusted him so much that he turned into a skeptic that democracy can work. That, of course, on top of what he was cr
Re: (Score:2)
you have his own account, a fascinating story: https://files.libcom.org/files... [libcom.org]
Re: (Score:2)
Thanks, I don't think I've read this one.
Re: (Score:1)
I reread 1984 a few years ago and the thing that really struck me is what Orwell got wrong: the notion that you need to erase evidence of factual data (at great effort/expense) in order to propagate lies. It turns out that you just need to shout a little louder and a lot of folks will eat it up.
That was a time when "photoshop" meant an actual workshop with lenses, cameras, artists, photographers, and so much else that only a government or the exceedingly wealthy could afford. I saw a YouTube video recently on how wealthy women in the days of black and white photography would spend good money to have photos of themselves taken and manipulated to show them as having unnaturally thin waists or whatever was fashionable. Even then they'd take steps to simplify the process by having a blank background
Re: (Score:2)
Re: What Orwell got wrong (Score:2)
reread 1984 a few years ago and the thing that really struck me is what Orwell got wrong: the notion that you need to erase evidence of factual data (at great effort/expense) in order to propagate lies. It turns out that you just need to shout a little louder and a lot of folks will eat it up.
I think you may have missed the point. It's not just about controlling Outer Party members, it's the hubris of literally trying to change the past, of eliminating objective reality. A hundred years hence when some cog in the MinRec machine looks up historical choco ration figures they will only see what the Party says they were.
Reality is what the Party decides it is.
Eventually even Inner Party members believe the world is what they say it is. It's not just about subjugation, despite the famous jackboot lin
"roughly the size of a postage stamp" (Score:1)
What's a postage stamp?
I'm only half joking as I know what a postage stamp looks like but I'm not sure I put a postage stamp on anything in the last decade. I've sent things in the mail but it's been either in a prepaid envelope or I took something to the post office where they did whatever to indicate postage paid on it. At least they didn't give this in Libraries of Congress, or football fields. If the press is going to use such size comparisons then perhaps they could use something more relatable to t
Re: "roughly the size of a postage stamp" (Score:2)
Obviously.
Ok so the same as power line analysis (Score:2)
So the same way the gov tracks the location of videos. Recorded ac power fluctuations from all power plants detected from small lighting changes in the tracked video.
I seen this on a documentary years ago. Not new.
Re: (Score:2)
Re: (Score:1)
So the same way the gov tracks the location of videos. Recorded ac power fluctuations from all power plants detected from small lighting changes in the tracked video.
I seen this on a documentary years ago. Not new.
I'm curious, can someone fill me in on more? I'd like to know more on how and when such techniques were used.
I do recall hearing how secure facilities would break the connection to the electric grid with a motor-generator set. This was to prevent anyone on the outside from picking up signals from the inside on the wires. The idea was that the mass of the spinning motor-generator was a kind of low pass filter that would stop any attempts to pick up data over the wires. Now I see that this works both ways
Re: (Score:2)
https://www.perpetuityresearch... [perpetuityresearch.com]
Researchers don't understand (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
It's much harder to get very subtle details right. Especially subtle details that are right down in the noise and have to be consistent across the entire video in all four dimensions. You can probably train an image generator to create a decent version of this watermark but it would likely be much more difficult than getting the right number of fingers on the hands.
yes but... (Score:2)
Re: (Score:2)
Sounds great (Score:2)
Until future ai models are trained to replicate the coding in surrounding parts of the video
Problematic (Score:2)
I see some problems with this approach, even though using structured light is intrinsically cool.
1. This is only to prevent deepfake video not photos.
2. Unless they can choose watermarks better, in the worst case it adds fluorescent light flicker which is indeed perceptible and annoying.
3. Authors say it is generally robust but weak against at least one type of attack (reflectance-only) and it is likely to be an evolving threat landscape.
4. Adversary who can derive a watermark, read it from the equipment or
Make an actual light that mimics the watermark? (Score:2)
Re: (Score:2)
A better idea (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Do not expect much (Score:2)
First, watermarks have never performed well. This one will not either. Second, If you try to use a watermark to convince somebody that something is genuine. that person has to be smart enough to understand the argument behind it. Most people are not.
Meh (Score:2)
It is relatively trivial to remove out any such pattern using an FFT and pyramidal decomposition.